-
1
-
-
0016562514
-
The wire-tap channel
-
A. D.Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
5
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
6
-
-
52349111390
-
Secure transmission with multiple antennas: The MISOME wiretap channel
-
Aug. [Online], submitted for publication
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas: The MISOME wiretap channel," IEEE Trans. Inf. Theory, Aug. 2007. [Online]. Available: http://arxiv.org/abs/0708.4219, submitted for publication.
-
(2007)
IEEE Trans. Inf. Theory
-
-
Khisti, A.1
Wornell, G.W.2
-
7
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, Sep.
-
R. Negi and S. Goelm, "Secret communication using artificial noise," in Proc. IEEE Vehicular Tech. Conf., Dallas, TX, Sep. 2005, vol. 3, pp. 1906-1910.
-
(2005)
Proc. IEEE Vehicular Tech. Conf.
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goelm, S.2
-
8
-
-
51849141978
-
The secrecy capacity of the MIMO wiretap channel
-
Oct. [Online], submitted for publication
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, Oct. 2007 [Online]. Available: http://aps.arxiv.org/abs/0710.1920, submitted for publication.
-
(2007)
IEEE Trans. Inf. Theory
-
-
Oggier, F.1
Hassibi, B.2
-
9
-
-
77951575307
-
A note on the secrecy capacity of the multi-antenna wiretap channel
-
Nov. [Online], submitted for publication
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multi-antenna wiretap channel," IEEE Trans. Inf. Theory, Nov. 2007 [Online]. Available: http://arxiv.org/abs/0710.4105, submitted for publication.
-
(2007)
IEEE Trans. Inf. Theory
-
-
Liu, T.1
Shamai, S.2
-
10
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
DOI 10.1109/ISIT.2005.1523727, 1523727, Proceedings of the 2005 IEEE International Symposium on Information Theory, ISIT 05
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, Australia, Sep. 2005, pp. 2152-2155. (Pubitemid 44508426)
-
(2005)
IEEE International Symposium on Information Theory - Proceedings
, vol.2005
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
11
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Baltimore, MD, Mar.
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. 41st Conf. Information Sciences Systems, Baltimore, MD, Mar. 2007.
-
(2007)
Proc. 41st Conf. Information Sciences Systems
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
12
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Shafiee, S.1
Ulukus, S.2
-
13
-
-
64549128283
-
Secure wireless communications via cooperation
-
Monticello, IL, Sep.-Oct.
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation," in Proc. 46th Annu. Allerton Conf. Commun., Control, Computing, Monticello, IL, Sep.-Oct. 2008.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun., Control, Computing
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
14
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
Taipei, Taiwan, Apr.
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Taipei, Taiwan, Apr. 2009.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
15
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
Cardiff, Wales, U.K., Aug.-Sep.
-
L. Dong, Z. Han, A. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proc. IEEE Statistical Signal Processing Workshop, Cardiff, Wales, U.K., Aug.-Sep. 2009.
-
(2009)
Proc. IEEE Statistical Signal Processing Workshop
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.V.4
-
16
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Jun.
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J.Wireless Commun. Netw. (Special Issue on Wireless Physical Layer Security), vol. 2009, Jun. 2009.
-
(2009)
EURASIP J.Wireless Commun. Netw. (Special Issue on Wireless Physical Layer Security)
, vol.2009
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
17
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
18
-
-
0345258506
-
User cooperation diversity-Part I: System description
-
Nov.
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-Part I: System description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
19
-
-
0345258508
-
User cooperation in diversity-Part II: Implementation aspects and performance analysis
-
Nov.
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation in diversity-Part II: Implementation aspects and performance analysis," IEEE Trans. Commun., vol. 51, pp. 1939-1948, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, pp. 1939-1948
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
20
-
-
37149055000
-
Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission
-
DOI 10.1049/iet-map:20060294
-
Z. Han and H. V. Poor, "Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission," IET Proc. Microwaves, Antennas, Propagation (Special Issue on Antenna Systems and Propagation for Future Wireless Communications), vol. 1, no. 6, pp. 1103-1110, Dec. 2007. (Pubitemid 350255763)
-
(2007)
IET Microwaves, Antennas and Propagation
, vol.1
, Issue.6
, pp. 1103-1110
-
-
Han, Z.1
Poor, H.V.2
-
21
-
-
84924437865
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
Z. Han and K. J. R. Liu, Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2008.
-
(2008)
Resource Allocation for Wireless Networks: Basics, Techniques, and Applications
-
-
Han, Z.1
Liu, K.J.R.2
-
22
-
-
50249162005
-
On the equivocation region of relay channels with orthogonal components
-
Monterey, CA, Nov.
-
X. He and A. Yener, "On the equivocation region of relay channels with orthogonal components," in Proc. 41st Asilomar Conf. Signals, Syst., Comput., Monterey, CA, Nov. 2007.
-
(2007)
Proc. 41st Asilomar Conf. Signals, Syst., Comput.
-
-
He, X.1
Yener, A.2
-
23
-
-
51349098469
-
Relay channels with confidential messages
-
Mar. [Online], submitted for publication
-
Y. Oohama, "Relay channels with confidential messages," IEEE Trans. Inf. Theory, Mar. 2007 [Online]. Available: http://arxiv.org/abs/cs.IT/ 0611125, submitted for publication.
-
(2007)
IEEE Trans. Inf. Theory
-
-
Oohama, Y.1
-
24
-
-
45249083184
-
Secure communication with a relay helping the wiretapper
-
Lake Tahoe, CA, Sep.
-
M. Yuksel and E. Erkip, "Secure communication with a relay helping the wiretapper," in Proc. 2007 IEEE Information Theory Workshop, Lake Tahoe, CA, Sep. 2007.
-
(2007)
Proc. 2007 IEEE Information Theory Workshop
-
-
Yuksel, M.1
Erkip, E.2
-
25
-
-
76249124606
-
A secure communication game with a relay helping the eavesdropper
-
Taormina, Italy, Oct.
-
M. Yuksel and E. Erkip, "A secure communication game with a relay helping the eavesdropper," in Proc. 2009 IEEE Inf. Theory Workshop, Taormina, Italy, Oct. 2009.
-
(2009)
Proc. 2009 IEEE Inf. Theory Workshop
-
-
Yuksel, M.1
Erkip, E.2
-
26
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
27
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
28
-
-
52349118726
-
The Gaussian wiretap channel with a helping interferer
-
Toronto, ON, Canada, Jul.
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "The Gaussian wiretap channel with a helping interferer," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, ON, Canada, Jul. 2008.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
30
-
-
69249217813
-
Secrecy capacity of a class of orthogonal relay eavesdropper channels
-
Article ID 494696
-
V. Aggarwal, L. Sankar, A. R. Calderbank, and H. V. Poor, "Secrecy capacity of a class of orthogonal relay eavesdropper channels," EURASIP J. Wireless Commun. Netw., vol. 2009, 2009, Article ID 494696, 14 pp.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
-
-
Aggarwal, V.1
Sankar, L.2
Calderbank, A.R.3
Poor, H.V.4
-
31
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.O.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
32
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
33
-
-
84940647248
-
Compound wire-tap channels
-
Monticello, IL, Sep.
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," in Proc. 45th Annu. Allerton Conf. Commun., Control, Comput., Monticello, IL, Sep. 2007.
-
(2007)
Proc. 45th Annu. Allerton Conf. Commun., Control, Comput.
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
34
-
-
0031207725
-
Application of antenna arrays to mobile communications, part II: Beam-forming and direction-of-arrival considerations
-
PII S0018921997057186
-
L. C. Godara, "Application of antenna arrays to mobile communications, Part II: Beam-forming and direction-of-arrival considerations," Proc. IEEE, vol. 85, pp. 1195-1245, Aug. 1997. (Pubitemid 127745622)
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.8
, pp. 1195-1245
-
-
Godara, L.C.1
-
36
-
-
0004236492
-
-
3rd ed. Baltimore, MD: The Johns Hopkins Univ. Press
-
G. Golub and C. Van Loan, Matrix Computations, 3rd ed. Baltimore, MD: The Johns Hopkins Univ. Press, 1996.
-
(1996)
Matrix Computations
-
-
Golub, G.1
Van Loan, C.2
-
37
-
-
84941534280
-
Performance analysis of a null-steering algorithm based on direction of arrival estimation
-
Apr.
-
B. Friedlander and B. Porat, "Performance analysis of a null-steering algorithm based on direction of arrival estimation," IEEE Trans. Signal Process., vol. 37, no. 4, pp. 461-466, Apr. 1989.
-
(1989)
IEEE Trans. Signal Process.
, vol.37
, Issue.4
, pp. 461-466
-
-
Friedlander, B.1
Porat, B.2
-
38
-
-
0742321280
-
Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels
-
Feb.
-
Q. Spencer, A. Swindlehurst, and M. Haardt, "Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels," IEEE Trans. Signal Process., vol. 52, no. 2, pp. 461-471, Feb. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.2
, pp. 461-471
-
-
Spencer, Q.1
Swindlehurst, A.2
Haardt, M.3
-
39
-
-
0019525292
-
Minimization by random search techniques
-
Feb.
-
F. J. Solis and R. J.-B. Wets, "Minimization by random search techniques," Math. Oper. Res., vol. 6, pp. 19-30, Feb. 1981.
-
(1981)
Math. Oper. Res.
, vol.6
, pp. 19-30
-
-
Solis, F.J.1
Wets, R.J.-B.2
-
40
-
-
65449132856
-
Distributed beamforming for relay networks based on second-order statistics of the channel state information
-
Sep.
-
V. Havary-Nassab, S. Shahbazpanahi, A. Grami, and Z. Luo, "Distributed beamforming for relay networks based on second-order statistics of the channel state information," IEEE Trans. Signal Process., vol. 56, no. 9, pp. 4306-4316, Sep. 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.9
, pp. 4306-4316
-
-
Havary-Nassab, V.1
Shahbazpanahi, S.2
Grami, A.3
Luo, Z.4
|